csce201-lect6.b - CSCE201 CSCE201 Security Fall2010...

Info icon This preview shows pages 1–8. Sign up to view the full content.

View Full Document Right Arrow Icon
CSCE 201 CSCE 201 Introduction to Information  Introduction to Information  Security  Security  Fall 2010 Fall 2010 Computer Recovery Computer Recovery
Image of page 1

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
CSCE 201 - Farkas 2 Reading assignments Reading assignments Required for this class: How to use the Backup utility to back up files and folders in Windows XP Home Edition, http://support.microsoft.com/kb/308422 Ed Bott .Windows XP Backup Made Easy , http://www.microsoft.com/windowsxp/using/setup/learnmore/ Required for next class: D. Cross, Data Protection and Recovery in Windows XP, http://technet.microsoft.com/en-us/library/bb457020.aspx
Image of page 2
CSCE 201 - Farkas 3 Protection of Personal Computers Security Policy Formal Informal Security Mechanisms Identification and Authentication Access Control Applications and updates Physical security Network-level security
Image of page 3

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
CSCE 201 - Farkas 4 Protection of Computing Resources Threats: Errors of users Natural/man-made/machine disasters Dishonest insider Disgruntled insider Outsiders Etc. Protection against threats Technical protections Non-technical protections Prevent, deter, detect, tolerate, recover
Image of page 4
CSCE 201 - Farkas 5 Physical Security Protection needs outside the computer system Direct threats Stealing, vandalism, espionage, etc. Typical protection: guards, locks, fences, etc. Indirect threats Natural disaster, electric surge, fire, etc. Protection: based on type of threat, e.g., power surge protection, location of computing facility, etc.
Image of page 5

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
CSCE 201 - Farkas 6 Natural Disasters Computer systems Same vulnerability as homes, cars, etc. Additional sensitivity: operating environment, e.g., temperature, humidity, etc. Vulnerable component: Hardware devices Data and software Goal: reduce the impact of a disaster
Image of page 6
CSCE 201 - Farkas 7 How to Measure Impact?
Image of page 7

Info iconThis preview has intentionally blurred sections. Sign up to view the full version.

View Full Document Right Arrow Icon
Image of page 8
This is the end of the preview. Sign up to access the rest of the document.

{[ snackBarMessage ]}

What students are saying

  • Left Quote Icon

    As a current student on this bumpy collegiate pathway, I stumbled upon Course Hero, where I can find study resources for nearly all my courses, get online help from tutors 24/7, and even share my old projects, papers, and lecture notes with other students.

    Student Picture

    Kiran Temple University Fox School of Business ‘17, Course Hero Intern

  • Left Quote Icon

    I cannot even describe how much Course Hero helped me this summer. It’s truly become something I can always rely on and help me. In the end, I was not only able to survive summer classes, but I was able to thrive thanks to Course Hero.

    Student Picture

    Dana University of Pennsylvania ‘17, Course Hero Intern

  • Left Quote Icon

    The ability to access any university’s resources through Course Hero proved invaluable in my case. I was behind on Tulane coursework and actually used UCLA’s materials to help me move forward and get everything together on time.

    Student Picture

    Jill Tulane University ‘16, Course Hero Intern